diff mbox series

ubusd: convert tx_queue to linked list

Message ID 20210323152325.84898-1-arnout@mind.be
State Changes Requested
Delegated to: Petr Štetiar
Headers show
Series ubusd: convert tx_queue to linked list | expand

Commit Message

Arnout Vandecappelle March 23, 2021, 3:23 p.m. UTC
ubusd maintains a per-client tx_queue containing references to message
buffers that have not been sent yet (due to the socket blocking). This
is a fixed-size, 64-element queue.

When more than 64 elements are queued, subsequent elements are simply
dropped. Thus, a client that is waiting for those messages will block
indefinitely. In particular, this happens when more than +- 250 objects
are registered on the bus and either "ubus list" or "ubus wait_for" is
called. The responses to these requests consist of a message buffer per
object. Since in practice, ubusd will not yield between the sends of
these message buffers, the client has no time to process them and
eventually the output socket blocks. After 64 more objects, the rest is
dropped, including the final message that indicates termination. Thus,
the client waits indefinitely for the termination message.

To solve this, turn the tx_queue into a variable-sized linked list
instead of a fixed-size queue.

To maintain the linked list, an additional structure ubus_msg_buf_list
is created. We could also have added the linked list to the ubus_msg_buf
struct itself, but it is not relevant in the many other uses of the
ubus_msg_buf struct so it would just complicate things.

The txq_off variable was used to keep track of which part of the current
message was already written, in case only a partial write was possible.
We take this opportunity to also move that variable under the
ubus_msg_buf_list structure (and rename it to "offset", and change its
type to size_t). This makes it clearer that it is related to that
particular queued message and not to the queue as a whole.

Note that this infinite tx_queue opens the door to a DoS attack. You can
open a client and a server connection, then send messages from the
client to the server without ever reading anything on the server side.
This will eventually lead to an out-of-memory. However, such a DoS
already existed anyway, it just requires opening multiple server
connections and filling up the fixed-size queue on each one. To protect
against such DoS attacks, we'd need to:
- keep a global maximum queue size that applies to all rx and tx queues
  together;
- stop reading from any connection when the maximum is reached;
- close any connection when it hasn't become writeable after some
  timeout.

Fixes: https://bugs.openwrt.org/index.php?do=details&task_id=1525

Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
---
 ubusd.c       | 23 ++++++++++++++---------
 ubusd.h       | 10 +++++++---
 ubusd_main.c  | 45 +++++++++++++++++++++------------------------
 ubusd_proto.c |  1 +
 4 files changed, 43 insertions(+), 36 deletions(-)

Comments

Petr Štetiar March 23, 2021, 4:16 p.m. UTC | #1
Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> [2021-03-23 16:23:25]:

Hi,

> To maintain the linked list, an additional structure ubus_msg_buf_list
> is created. We could also have added the linked list to the ubus_msg_buf
> struct itself, but it is not relevant in the many other uses of the
> ubus_msg_buf struct so it would just complicate things.

I've just tried to run CI pipeline[1] on this patch and got following complaints
from clang static analyzer[2]:

 ubusd_main.c:33:3: warning: Use of memory after it is freed [unix.Malloc]
                 ubus_msg_list_free(ubl);
                 ^~~~~~~~~~~~~~~~~~~~~~~

 ubusd_main.c:76:39: warning: Use of memory after it is freed [unix.Malloc]
                 written = ubus_msg_writev(sock->fd, ubl->msg, ubl->offset);
                                                     ^~~~~~~~

1. https://gitlab.com/ynezz/openwrt-ubus/-/pipelines/275104805
2. https://ynezz.gitlab.io/-/openwrt-ubus/-/jobs/1121145462/artifacts/build/scan/2021-03-23-154521-70-1/index.html

Cheers,

Petr
Arnout Vandecappelle March 24, 2021, 7:52 a.m. UTC | #2
On 23/03/2021 17:16, Petr Štetiar wrote:
> Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> [2021-03-23 16:23:25]:
> 
> Hi,
> 
>> To maintain the linked list, an additional structure ubus_msg_buf_list
>> is created. We could also have added the linked list to the ubus_msg_buf
>> struct itself, but it is not relevant in the many other uses of the
>> ubus_msg_buf struct so it would just complicate things.
> 
> I've just tried to run CI pipeline[1] on this patch and got following complaints
> from clang static analyzer[2]:
> 
>  ubusd_main.c:33:3: warning: Use of memory after it is freed [unix.Malloc]
>                  ubus_msg_list_free(ubl);
>                  ^~~~~~~~~~~~~~~~~~~~~~~
> 
>  ubusd_main.c:76:39: warning: Use of memory after it is freed [unix.Malloc]
>                  written = ubus_msg_writev(sock->fd, ubl->msg, ubl->offset);
>                                                      ^~~~~~~~
> 
> 1. https://gitlab.com/ynezz/openwrt-ubus/-/pipelines/275104805
> 2. https://ynezz.gitlab.io/-/openwrt-ubus/-/jobs/1121145462/artifacts/build/scan/2021-03-23-154521-70-1/index.html

 This is a false positive. I suspect that clang doesn't see that !list_empty()
implies that the list is not empty. I'll try to rewrite using assigning to ubl
in the while loop header rather than in the body.

 Regards,
 Arnout
Arnout Vandecappelle March 24, 2021, 8:06 a.m. UTC | #3
On 24/03/2021 08:52, Arnout Vandecappelle wrote:
> 
> 
> On 23/03/2021 17:16, Petr Štetiar wrote:
>> Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> [2021-03-23 16:23:25]:
>>
>> Hi,
>>
>>> To maintain the linked list, an additional structure ubus_msg_buf_list
>>> is created. We could also have added the linked list to the ubus_msg_buf
>>> struct itself, but it is not relevant in the many other uses of the
>>> ubus_msg_buf struct so it would just complicate things.
>>
>> I've just tried to run CI pipeline[1] on this patch and got following complaints
>> from clang static analyzer[2]:
>>
>>  ubusd_main.c:33:3: warning: Use of memory after it is freed [unix.Malloc]
>>                  ubus_msg_list_free(ubl);
>>                  ^~~~~~~~~~~~~~~~~~~~~~~
>>
>>  ubusd_main.c:76:39: warning: Use of memory after it is freed [unix.Malloc]
>>                  written = ubus_msg_writev(sock->fd, ubl->msg, ubl->offset);
>>                                                      ^~~~~~~~
>>
>> 1. https://gitlab.com/ynezz/openwrt-ubus/-/pipelines/275104805
>> 2. https://ynezz.gitlab.io/-/openwrt-ubus/-/jobs/1121145462/artifacts/build/scan/2021-03-23-154521-70-1/index.html
> 
>  This is a false positive. I suspect that clang doesn't see that !list_empty()
> implies that the list is not empty. I'll try to rewrite using assigning to ubl
> in the while loop header rather than in the body.

 Duh, that doesn't work - list_first_entry doesn't give NULL if the list is empty...

 I'm not sure how to fix this. Any ideas?

 Regards,
 Arnout
Petr Štetiar March 24, 2021, 8:31 a.m. UTC | #4
Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> [2021-03-23 16:23:25]:

Hi,

> Note that this infinite tx_queue opens the door to a DoS attack.

memory is not infinite, so I think, that some sensible upper limit should be
kept. It might be much higher by default since it's dynamic now, but still
should be capped and lifted if needed.

Cheers,

Petr
Petr Štetiar March 24, 2021, 8:32 a.m. UTC | #5
Arnout Vandecappelle <arnout@mind.be> [2021-03-24 09:06:55]:

>  I'm not sure how to fix this. Any ideas?

see for example c5f2053dfcfd1b81a3d29cdd27b26751b96e1acd
Arnout Vandecappelle March 25, 2021, 8:34 a.m. UTC | #6
On 24/03/2021 09:31, Petr Štetiar wrote:
> Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> [2021-03-23 16:23:25]:
> 
> Hi,
> 
>> Note that this infinite tx_queue opens the door to a DoS attack.
> 
> memory is not infinite, so I think, that some sensible upper limit should be
> kept. It might be much higher by default since it's dynamic now, but still
> should be capped and lifted if needed.

 I agree, however:

- the limit should be a global one (not per client);
- it should take into account Rx, Tx and monitor buffers;
- it's not exactly simple to implement (or I don't see a simple way to implement
it);
- I don't have time to work on this;
- it's anyway a rather theoretical issue which already exists anyway, as
explained in the commit message;
- the fix is fixing an actual use case that is not theoretical at all (as in, we
have a device that doesn't boot due to this issue).

 Regards,
 Arnout
Sergey Zakharchenko March 25, 2021, 9:09 a.m. UTC | #7
Hi Arnout,

JFYI: Much of your patch resembles
https://patchwork.ozlabs.org/project/lede/patch/20180503100622.11168-1-i@qbox.audio/
which was marked superseded for no apparent reason, but "anonymous
remembers":).

As for the limits, one of them could include a timeout (e.g. no
progress in writing to client for over 10s => ubusd closes
connection).

Best regards,
Arnout Vandecappelle March 25, 2021, 8:49 p.m. UTC | #8
On 25/03/2021 10:09, Sergey Zakharchenko wrote:
> Hi Arnout,
> 
> JFYI: Much of your patch resembles
> https://patchwork.ozlabs.org/project/lede/patch/20180503100622.11168-1-i@qbox.audio/
> which was marked superseded for no apparent reason, but "anonymous
> remembers":).

 It's delegated to John, so maybe he intended to rework and apply it but never
got around to it.


> As for the limits, one of them could include a timeout (e.g. no
> progress in writing to client for over 10s => ubusd closes
> connection).

 Oh yes, just what we need, more complexity :-)

 I agree though that timeout on Tx would make sense. It doesn't help for DoS
attacks, but it does help to protect against a frozen client.

 Regards,
 Arnout
diff mbox series

Patch

diff --git a/ubusd.c b/ubusd.c
index 5993653..b7cafaf 100644
--- a/ubusd.c
+++ b/ubusd.c
@@ -133,24 +133,31 @@  ssize_t ubus_msg_writev(int fd, struct ubus_msg_buf *ub, size_t offset)
 	return ret;
 }
 
-static void ubus_msg_enqueue(struct ubus_client *cl, struct ubus_msg_buf *ub)
+static void ubus_msg_enqueue(struct ubus_client *cl, struct ubus_msg_buf *ub,
+			     size_t offset)
 {
-	if (cl->tx_queue[cl->txq_tail])
+	struct ubus_msg_buf_list *ubl;
+
+	ubl = calloc(1, sizeof(struct ubus_msg_buf_list));
+	if (!ubl)
 		return;
 
-	cl->tx_queue[cl->txq_tail] = ubus_msg_ref(ub);
-	cl->txq_tail = (cl->txq_tail + 1) % ARRAY_SIZE(cl->tx_queue);
+	INIT_LIST_HEAD(&ubl->list);
+	ubl->msg = ubus_msg_ref(ub);
+	ubl->offset = offset;
+
+	list_add_tail(&cl->tx_queue, &ubl->list);
 }
 
 /* takes the msgbuf reference */
 void ubus_msg_send(struct ubus_client *cl, struct ubus_msg_buf *ub)
 {
-	ssize_t written;
+	ssize_t written = 0;
 
 	if (ub->hdr.type != UBUS_MSG_MONITOR)
 		ubusd_monitor_message(cl, ub, true);
 
-	if (!cl->tx_queue[cl->txq_cur]) {
+	if (list_empty(&cl->tx_queue)) {
 		written = ubus_msg_writev(cl->sock.fd, ub, 0);
 
 		if (written < 0)
@@ -159,10 +166,8 @@  void ubus_msg_send(struct ubus_client *cl, struct ubus_msg_buf *ub)
 		if (written >= (ssize_t) (ub->len + sizeof(ub->hdr)))
 			return;
 
-		cl->txq_ofs = written;
-
 		/* get an event once we can write to the socket again */
 		uloop_fd_add(&cl->sock, ULOOP_READ | ULOOP_WRITE | ULOOP_EDGE_TRIGGER);
 	}
-	ubus_msg_enqueue(cl, ub);
+	ubus_msg_enqueue(cl, ub, written);
 }
diff --git a/ubusd.h b/ubusd.h
index 923e43d..4131274 100644
--- a/ubusd.h
+++ b/ubusd.h
@@ -23,7 +23,6 @@ 
 #include "ubusmsg.h"
 #include "ubusd_acl.h"
 
-#define UBUSD_CLIENT_BACKLOG	32
 #define UBUS_OBJ_HASH_BITS	4
 
 extern struct blob_buf b;
@@ -36,6 +35,12 @@  struct ubus_msg_buf {
 	int len;
 };
 
+struct ubus_msg_buf_list {
+	struct list_head list;
+	struct ubus_msg_buf *msg;
+	size_t offset;
+};
+
 struct ubus_client {
 	struct ubus_id id;
 	struct uloop_fd sock;
@@ -48,8 +53,7 @@  struct ubus_client {
 
 	struct list_head objects;
 
-	struct ubus_msg_buf *tx_queue[UBUSD_CLIENT_BACKLOG];
-	unsigned int txq_cur, txq_tail, txq_ofs;
+	struct list_head tx_queue;
 
 	struct ubus_msg_buf *pending_msg;
 	struct ubus_msg_buf *retmsg;
diff --git a/ubusd_main.c b/ubusd_main.c
index c3d8049..908cc21 100644
--- a/ubusd_main.c
+++ b/ubusd_main.c
@@ -17,28 +17,21 @@ 
 
 #include "ubusd.h"
 
-static struct ubus_msg_buf *ubus_msg_head(struct ubus_client *cl)
+static void ubus_msg_list_free(struct ubus_msg_buf_list *ubl)
 {
-	return cl->tx_queue[cl->txq_cur];
-}
-
-static void ubus_msg_dequeue(struct ubus_client *cl)
-{
-	struct ubus_msg_buf *ub = ubus_msg_head(cl);
-
-	if (!ub)
-		return;
-
-	ubus_msg_free(ub);
-	cl->txq_ofs = 0;
-	cl->tx_queue[cl->txq_cur] = NULL;
-	cl->txq_cur = (cl->txq_cur + 1) % ARRAY_SIZE(cl->tx_queue);
+	list_del(&ubl->list);
+	ubus_msg_free(ubl->msg);
+	free(ubl);
 }
 
 static void handle_client_disconnect(struct ubus_client *cl)
 {
-	while (ubus_msg_head(cl))
-		ubus_msg_dequeue(cl);
+	while (!list_empty(&cl->tx_queue)) {
+		struct ubus_msg_buf_list *ubl = list_first_entry
+				(&cl->tx_queue, struct ubus_msg_buf_list,
+				 list);
+		ubus_msg_list_free(ubl);
+	}
 
 	ubusd_monitor_disconnect(cl);
 	ubusd_proto_free_client(cl);
@@ -55,6 +48,7 @@  static void client_cb(struct uloop_fd *sock, unsigned int events)
 	uint8_t fd_buf[CMSG_SPACE(sizeof(int))] = { 0 };
 	struct msghdr msghdr = { 0 };
 	struct ubus_msg_buf *ub;
+	struct ubus_msg_buf_list *ubl;
 	static struct iovec iov;
 	struct cmsghdr *cmsg;
 	int *pfd;
@@ -73,10 +67,13 @@  static void client_cb(struct uloop_fd *sock, unsigned int events)
 	msghdr.msg_controllen = cmsg->cmsg_len;
 
 	/* first try to tx more pending data */
-	while ((ub = ubus_msg_head(cl))) {
+	while (!list_empty(&cl->tx_queue)) {
 		ssize_t written;
 
-		written = ubus_msg_writev(sock->fd, ub, cl->txq_ofs);
+		ubl = list_first_entry(&cl->tx_queue, struct ubus_msg_buf_list,
+				       list);
+
+		written = ubus_msg_writev(sock->fd, ubl->msg, ubl->offset);
 		if (written < 0) {
 			switch(errno) {
 			case EINTR:
@@ -88,16 +85,16 @@  static void client_cb(struct uloop_fd *sock, unsigned int events)
 			break;
 		}
 
-		cl->txq_ofs += written;
-		if (cl->txq_ofs < ub->len + sizeof(ub->hdr))
+		ubl->offset += written;
+		if (ubl->offset < ubl->msg->len + sizeof(ubl->msg->hdr))
 			break;
 
-		ubus_msg_dequeue(cl);
+		ubus_msg_list_free(ubl);
 	}
 
 	/* prevent further ULOOP_WRITE events if we don't have data
 	 * to send anymore */
-	if (!ubus_msg_head(cl) && (events & ULOOP_WRITE))
+	if (list_empty(&cl->tx_queue) && (events & ULOOP_WRITE))
 		uloop_fd_add(sock, ULOOP_READ | ULOOP_EDGE_TRIGGER);
 
 retry:
@@ -171,7 +168,7 @@  retry:
 	}
 
 out:
-	if (!sock->eof || ubus_msg_head(cl))
+	if (!sock->eof || !list_empty(&cl->tx_queue))
 		return;
 
 disconnect:
diff --git a/ubusd_proto.c b/ubusd_proto.c
index 4746605..b20f91c 100644
--- a/ubusd_proto.c
+++ b/ubusd_proto.c
@@ -495,6 +495,7 @@  struct ubus_client *ubusd_proto_new_client(int fd, uloop_fd_handler cb)
 		goto free;
 
 	INIT_LIST_HEAD(&cl->objects);
+	INIT_LIST_HEAD(&cl->tx_queue);
 	cl->sock.fd = fd;
 	cl->sock.cb = cb;
 	cl->pending_msg_fd = -1;